Web Services Dynamic Discovery (WS-Discovery) Version 1.0

Web Services Dynamic Discovery (WS-Discovery) Version 1.0

Web Services Dynamic Discovery (WS-Discovery) Version 1.1

Committee Draft 01

21October 2008

Specification URIs:

This Version:

Format)

Previous Version:

Latest Version:

Latest Approved Version:

TBD

Technical Committee:

OASIS Web Services Discovery and Web Services Devices Profile (WS-DD) TC

Chair(s):

Toby Nixon, Microsoft Corporation

Alain Regnier, Ricoh Company Limited

Editor(s):

Vipul Modi, Microsoft Corporation

Devon Kemp, Canon Inc.

Declared XML Namespace(s):

Abstract:

This specification defines a discovery protocol to locate services. In an ad hoc mode of operation, probes are sent to a multicast group, and target services that match return a response directly to the requester. To scale to a large number of endpoints and to extend the reach of the protocol, thisprotocol defines a managed mode of operation and amulticast suppression behavior if a discovery proxy is available on the network. To minimize the need for polling, target services thatwish to be discovered send an announcement when they join and leave the network.

Status:

This document was last revised or approved by the WS-DD TC on the above date. The level of approval is also listed above. Check the “Latest Version” or “Latest Approved Version” location noted above for possible later revisions of this document.

Technical Committee members should send comments on this specification to the Technical Committee’s email list. Others should send comments to the Technical Committee by using the “Send A Comment” button on the Technical Committee’s web page at

For information on whether any patents have been disclosed that may be essential to implementing this specification, and any offers of patent licensing terms, please refer to the Intellectual Property Rights section of the Technical Committee web page (

The non-normative errata page for this specification is located at

Notices

Copyright © OASIS® 2008. All Rights Reserved.

All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy (the "OASIS IPR Policy"). The full Policy may be found at the OASIS website.

This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document itself may not be modified in any way, including by removing the copyright notice or references to OASIS, except as needed for the purpose of developing any document or deliverable produced by an OASIS Technical Committee (in which case the rules applicable to copyrights, as set forth in the OASIS IPR Policy, must be followed) or as required to translate it into languages other than English.

The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns.

This document and the information contained herein is provided on an "AS IS" basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

OASIS requests that any OASIS Party or any other party that believes it has patent claims that would necessarily be infringed by implementations of this OASIS Committee Specification or OASIS Standard, to notify OASIS TC Administrator and provide an indication of its willingness to grant patent licenses to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification.

OASIS invites any party to contact the OASIS TC Administrator if it is aware of a claim of ownership of any patent claims that would necessarily be infringed by implementations of this specification by a patent holder that is not willing to provide a license to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification. OASIS may include such claims on its website, but disclaims any obligation to do so.

OASIS takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on OASIS' procedures with respect to rights in any document or deliverable produced by an OASIS Technical Committee can be found on the OASIS website. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this OASIS Committee Specification or OASIS Standard, can be obtained from the OASIS TC Administrator. OASIS makes no representation that any information or list of intellectual property rights will at any time be complete, or that any claims in such list are, in fact, Essential Claims.

The name "OASIS" is trademarks of OASIS, the owner and developer of this specification, and should be used only to refer to the organization and its official outputs. OASIS welcomes reference to, and implementation and use of, specifications, while reserving the right to enforce its marks against misleading uses. Please see for above guidance.

Table of Contents

1Introduction

1.1 Composable Architecture

1.2 Requirements

1.3 Non Requirements

1.4 Example

1.5 Normative References

2Terminology and Notations

2.1 Terminology

2.2 Notational Conventions

2.3 XML Namespaces

2.4 XSD and WSDL Files

2.5 Protocol Assignments

2.5.1 Ad hoc mode over IP multicast

2.5.2 Managed mode over HTTP

2.5.3 Application Level Transmission Delay

2.6 Compliance

2.7 Endpoint References

3Model

3.1 Ad hoc Mode

3.2 Managed Mode

3.3 Dynamic Mode Switching

4Hello and Bye

4.1 Hello

4.1.1 Target Service

4.1.2 Client

4.1.3 Discovery Proxy

4.2 Bye

4.2.1 Target Service

4.2.2 Client

4.2.3 Discovery Proxy

5Probe and Probe Match

5.1 Matching Types and Scopes

5.2 Probe

5.2.1 Client

5.2.2 Target Service

5.2.3 Discovery Proxy

5.3 Probe Match

5.3.1 Target Service

5.3.2 Discovery Proxy

6Resolve and Resolve Match

6.1 Matching Endpoint Reference

6.2 Resolve

6.2.1 Client

6.2.2 Target Service

6.2.3 Discovery Proxy

6.3 Resolve Match

6.3.1 Target Service

6.3.2 Discovery Proxy

7Application Sequencing

8Security

8.1 Security Model

8.2 Compact Signature Format

8.3 Security Considerations

A.Acknowledgements

B.Revision History

wsdd-discovery-1.1-spec-wd-04 23November 2008

Copyright © OASIS® 2008. All Rights Reserved.Page 1 of 43

1Introduction

This specification defines a discovery protocol to locate services. The primary mode of discovery is a client searching for one or more target services. The protocol defines two modes of operation,an ad hoc mode and a managed mode. In an ad hoc mode, to find a target service by the type of the target service, a scope in which the target service resides, or both, a client sends a probe message to a multicast group; target services that match the probe send a response directly to the client. To locate a target service by name, a client sends a resolution request message to the same multicast group, and again, the target service that matches sends a response directly to the client.

To minimize the need for polling in an ad hoc network, when a target service joins the network, it sends an announcement message to the same multicast group. By listening to this multicast group, clients can detect newly-available target services without repeated probing.

To scale to a large number of endpoints and to extend the reach of the protocol beyond the range of an ad hoc network, this specification defines a managed mode of operation and a multicast suppression behavior if a discovery proxy is available on the network. In managed mode, target services sent unicast announcement messages to a discovery proxy and clients send unicast probe and resolve messages to a discovery proxy. To reduce multicast traffic, when a discovery proxy detects a probe or resolution request sent multicast on an ad hoc network, it sends an announcement for itself. By listening for these announcements, clients detect discovery proxies and switch to a managed mode of operation and send unicast probe and resolve messages directly to a discovery proxy. However, if a discovery proxy is unresponsive, clients revert to an ad hoc mode of operation.

To support networks with explicit network management services like DHCP, DNS, domain controllers, directories, etc., this specification acknowledges that clients and/or target services may be configured to behave differently than defined herein. For example, another specification may define a well-known DHCP record containing the address of a discovery proxy, and compliance with that specification may require client and target services to operate in a managed mode and send messages to this discovery proxy rather than to a multicast group. While the specific means of such configuration is beyond the scope of this specification, it is expected that any such configuration would allow clients and/ortarget services to migrate smoothly between carefully-managed and ad hoc networks.

1.1Composable Architecture

The Web service specifications (WS-*) are designed to be composed with each other to provide a rich set of tools to provide security in the Web services environment. This specification specifically relies on other Web service specifications to provide secure, reliable, and/or transacted message delivery and to express Web service and client policy.

1.2Requirements

This specification intends to meet the following requirements:

  • Allow discovery of services in ad hoc networks with a minimum of networking services (e.g., no DNS or directory services).
  • Leverage network services to reduce network traffic and allow discovery of services in managed networks where such network services exist.
  • Enable smooth transitions between ad hoc and managed networks.
  • Enable discovery of resource-limited service implementations.
  • Support bootstrapping to other Web service protocols as well as other transports.
  • Enable discovery of services by type and within scope.
  • Leverage other Web service specifications for secure, reliable, transacted message delivery.
  • Provide extensibility for more sophisticated and/or currently unanticipated scenarios.

1.3Non Requirements

This specification does not intend to meet the following requirements:

  • Provide liveness information on services.
  • Define a data model for service description or define rich queries over that description.
  • Support Internet-scale discovery.

1.4Example

Table 1lists an example Probe message sent multicast by a Client searching for a printer in an ad hoc mode.

Table 1: Example Probe sent multicast in an ad hoc mode.

(01)<s:Envelope

(02) xmlns:a="

(03) xmlns:d="

(04) xmlns:i="

(05) xmlns:s=" >

(06) <s:Header>

(07) <a:Action>

(08)

(09) </a:Action>

(10) <a:MessageID>

(11) urn:uuid:0a6dc791-2be6-4991-9af1-454778a1917a

(12) </a:MessageID>

(13) <a:To>urn:docs-oasis-open-org:ws-dd:discovery:2008:09</a:To>

(14) </s:Header>

(15) <s:Body>

(16) <d:Probe>

(17) <d:Types>i:PrintBasic</d:Types>

(18) <d:Scopes

(19) MatchBy=" >

(20) ldap:///ou=engineering,o=examplecom,c=us

(21) </d:Scopes>

(22) </d:Probe>

(23) </s:Body>

(24)</s:Envelope>

(25)

Lines (07-09) in Table 1 indicate the message is a Probe, and Line (13) indicates it is being sent to a well-known address [RFC 2141].

Because there is no explicit ReplyTo SOAP header block [WS-Addressing], any response to this Probe message will be sent as a UDP packet to the source IP address and port of the Probe transport header [SOAP/UDP].

Lines (17-21) specify two constraints on the Probe: Line (17) constrains responses to Target Services that implement a basic print Type; Lines (18-21) constrain responses to Target Services in the Scope for an engineering department. Only Target Services that satisfy both of these constraints will respond. Though both constraints are included in this example, a Probe is not required to include either.

Table 2 lists an example Probe Match message sent in response to the Probe in Table 1.

Table 2: Example ProbeMatch sent in response to the ad hoc Probe in Table 1.

(01)<s:Envelope

(02) xmlns:a="

(03) xmlns:d="

(04) xmlns:i="

(05) xmlns:s=" >

(06) <s:Header>

(07) <a:Action>

(08)

(09) </a:Action>

(10) <a:MessageID>

(11) urn:uuid:e32e6863-ea5e-4ee4-997e-69539d1ff2cc

(12) </a:MessageID>

(13) <a:RelatesTo>

(14) urn:uuid:0a6dc791-2be6-4991-9af1-454778a1917a

(15) </a:RelatesTo>

(16) <a:To>

(17)

(18) </a:To>

(19) <d:AppSequence InstanceId="1077004800" MessageNumber="2" />

(20) </s:Header>

(21) <s:Body>

(22) <d:ProbeMatches>

(23) <d:ProbeMatch>

(24) <a:EndpointReference>

(25) <a:Address>

(26) urn:uuid:98190dc2-0890-4ef8-ac9a-5940995e6119

(27) </a:Address>

(28) </a:EndpointReference>

(29) <d:Types>i:PrintBasic i:PrintAdvanced</d:Types>

(30) <d:Scopes>

(31) ldap:///ou=engineering,o=examplecom,c=us

(32) ldap:///ou=floor1,ou=b42,ou=anytown,o=examplecom,c=us

(33)

(34) </d:Scopes>

(35) <d:XAddrs>

(36) <d:MetadataVersion>75965</d:MetadataVersion>

(37) </d:ProbeMatch>

(38) </d:ProbeMatches>

(39) </s:Body>

(40)</s:Envelope>

(41)

Lines (07-09) in Table 2 indicate this message is a Probe Match, and Lines (13-15) indicate that it is a response to the Probe in Table 1. Because the Probe did not have an explicit ReplyTo SOAP header block, Lines (16-18) indicate that the response was sent to the source IP address and port of the transport header of the Probe. Line (19) contains an instance identifier as well as a message number; this information allows the receiver to reorder discovery messages received from a Target Service.

Lines (23-37) describe a single Target Service.

Lines (24-28) contain the stable, unique identifier for the Target Service that is constant across network interfaces, transport addresses, and IPv4/v6. In this case, the value is a UUID based URN [RFC 4122] scheme URI, but it may be a transport URI (like the one in Line 35) if it meets stability and uniqueness requirements.

Line (29) lists the Types (see, e.g., [WSDL 1.1]) implemented by the Target Service, in this example, a basic print type that matched the Probe as well as an advanced print type.

Lines (30-34) list three administrative Scopes, one that matched the Probe (Line 31), one that is specific to a particular physical location (Line 32), and one that includes data useful when switching over to new infrastructure (Line 33). As in this case, the Scopes may be a heterogeneous collection of deployment-related information.

Line (35) indicates the transport addresses where the Target Service may be reached; in this case, a single HTTP transport address.

Line (36) contains the version of the metadata for the Target Service; as explained below, this version is incremented if there is a change in the metadata for the Target Service (including Lines 29-34).

1.5Normative References

[RFC2119]S. Bradner, Key words for use in RFCs to Indicate Requirement Levels, IETF RFC 2119, March 1997.

[IANA]Port Numbers, February 2005.

[Namespaces in XML 1.1]W3C Recommendation, Namespaces in XML 1.1, 4 February 2004.

[RFC 2141]R. Moats, URN Syntax, IETF RFC 2141, May 1997.

[RFC 2253]M. Wahl, et al, Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished Names, IETF RFC 2253, December 1997.

[RFC 2255]T. Howes, et al, The LDAP URL Format, IETF RFC 2255, December 1997.

[RFC 3986]T. Berners-Lee, et al, Uniform Resource Identifiers (URI): Generic Syntax, IETF RFC 3986, January2005.

[RFC 3987]M. Duerst, et al, Internationalized Resource Identifiers (IRIs), IETF RFC 3987, January2005.

[SOAP 1.1]W3C Note, Simple Object Access Protocol (SOAP) 1.1, 08 May 2000.

[SOAP 1.2]W3C Recommendation, SOAP Version 1.2 Part 1: Messaging Framework (Second Edition), April 2007.

[SOAP 1.2, Part 2]W3C Recommendation, SOAP Version 1.2 Part 2: Adjuncts Second Edition), Section 7: SOAP HTTP Binding, April 2007.

[SOAP/UDP]OASIS Committee Draft 01, SOAP-over-UDP Version 1.1, October 2008.

[RFC 4122]P. Leach, et al, A Universally Unique IDentifier (UUID) URN Namespace, IETF RFC 4122, July2005.

[RFC 5280]P. Leach, et al, A Universally Unique IDentifier (UUID) URN Namespace, IETF RFC 4122, July2005.

[WS-Addressing]W3C Recommendation, Web Services Addressing 1.0 - Core, May 2006.

[WS-SecureConversation]S. Anderson, et al, Web Services Secure Conversation Language (WS-SecureConversation), February 2005.

[WS-Trust]S. Anderson, et al, Web Services Trust Language (WS-Trust), 2005.

[WS-Security]A. Nadalin, et al, Web Services Security: SOAP Message Security, March 2004.

[RDDL]Jonathan Borden, et al, Resource Directory Description Language (RDDL) 2.0, 18January 2004.

[WSDL 1.1]W3C Note, Web Services Description Language (WSDL) 1.1, 15 March 2001.

[XML Schema, Part 1] W3C Recommendation, XML Schema Part 1: Structures, 2 May 2001.

[XML Schema, Part 2]W3C Recommendation, XML Schema Part 2: Datatypes, 02 May 2001.

[XML Sig]W3C Recommendation, XML-Signature Syntax and Processing, 12 February 2002.

2Terminology and Notations

2.1Terminology

Target Service: An endpoint that makes itself available for discovery.

Client:An endpoint that searches for Target Service(s).

Discovery Proxy:An endpoint that facilitates discovery of Target Services by Clients.

Hello:A message sent by a Target Service when it joins a network; this message contains key information for the Target Service.A Hello message is also sent by a Discovery Proxy to reduce multicast traffic on an ad hoc network; this message contains key information about the Discovery Proxy.

Bye:A best-effort message sent by a Target Service when it leaves a network.

Probe:A message sent by a Client searching for a Target Service by Type and/or Scope.

Resolve:A message sent by a Client searching for a Target Service by name.

Type:An identifier for a set of messages an endpoint sends and/or receives (e.g., a WSDL 1.1 portType, see [WSDL 1.1]).

Scope:An extensibility point that allows Target Services to be organized into logical groups.

Metadata: Information about the Target Service; includes, but is not limited to, transports and protocols a Target Service understands, Types it implements, and Scopes it is in.

Ad hoc Mode: An operational mode of discovery in which the Hello, Bye, Probe and Resolve messages are sent multicast.

Managed Mode: An operational mode of discovery in which the Hello, Bye, Probe and Resolve message are sent unicast to a Discovery Proxy.

Ad hoc Network: A network in which discovery is performed in an ad hoc mode.

Managed Network: A network in which discovery is performed in a managed mode.

2.2Notational Conventions

The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in [RFC 2119].

This specification uses the following syntax to define normative outlines for messages:

The syntax appears as an XML instance, but values in italics indicate data types instead of literal values.

Characters are appended to elements and attributes to indicate cardinality:

  • "?" (0 or 1)
  • "*" (0 or more)
  • "+" (1 or more)
  • The character "|" is used to indicate a choice between alternatives.
  • The characters "[" and "]" are used to indicate that contained items are to be treated as a group with respect to cardinality or choice.
  • Ellipses (i.e., "...") indicate points of extensibility. Additional children and/or attributes MAY be added at the indicated extension points but MUST NOT contradict the semantics of the parent and/or owner, respectively. If a receiver does not recognize an extension, the receiver SHOULD ignore the extension.
  • XML namespace prefixes (see Table 3) are used to indicate the namespace of the element being defined.

Elsewhere in this specification, the characters "[" and "]" are used to call out references and property names. This specification uses the [action] and Fault properties [WS-Addressing] to define faults.